IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security Reports
 
Attacker Economics
sponsored by F5 Networks
EBOOK: How can your financial services organization stay one step ahead of attackers? It starts with understanding the economics of today’s most prevalent cyber threats and how you can use those economics to demotivate attackers. Download this e-book to learn more.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TOPICS:  Security
F5 Networks

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

IronNet

The 2021 Ransomware Survival Guide
sponsored by Proofpoint
EBOOK: Ransomware is an old threat that persists as a modern-day problem, but most companies are ill-prepared for a ransomware attack. Download this guide to find out what you can do before, during, and after a ransomware attack to protect your organization.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

TOPICS:  Malware | Security
Proofpoint

CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
sponsored by ComputerWeekly.com
EGUIDE: The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

ComputerWeekly.com

Innovation Insight For Extended Detection And Response
sponsored by Palo Alto Networks
ANALYST REPORT: This Gartner report discusses both the advantages and the inherent risks of embracing an XDR solution. Inside the report, you'll find a deep dive into XDR product capabilities, an assessment of XDR benefits, uses and potential risks, examples of use cases where XDR makes sense, and criteria for evaluating the different offerings.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

TOPICS:  Security
Palo Alto Networks

IDC Marketscape: Worldwide Managed Security Services 2020 Vendor Assessment
sponsored by AT&T Cybersecurity
ANALYST REPORT: Download the report today to see what the IDC MarketScape had to say in their worldwide managed security services 2020 vendor assessment.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Security
AT&T Cybersecurity

Prisma Access 2.0: All Apps, All Users, Protected Anywhere
sponsored by Palo Alto Networks
WEBCAST: Digital transformation and work-from-anywhere mandates are driving massive changes to enterprise infrastructures. As a result, enterprises are faced with the challenge of effectively closing their security gaps while accommodating the productivity demands of their remote workforces.
Posted: 23 Mar 2021 | Premiered: Mar 23, 2021

TOPICS:  Security
Palo Alto Networks

Top Compliance Challenges with Online Video for Financial Institutions
sponsored by Theta Lake
WHITE PAPER: For financial institutions, online video provides endless opportunities to support business goals, but effective creation and review of video content requires meaningful compliance engagement. Adopting proven best practices for video compliance can make it possible to successfully navigate through these challenges.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

TOPICS:  Security
Theta Lake

Universal Directory: Create One World.
sponsored by Okta
EBOOK: Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

Complete Guide to Identity and Access Management
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 25 Mar 2021 | Published: 19 Jun 2020

TechTarget
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences